Skip to content

Instantly share code, notes, and snippets.

@jcnars
Created October 6, 2021 06:02
Show Gist options
  • Save jcnars/4b188b73b7020a8cc97d8f6c0be15fb8 to your computer and use it in GitHub Desktop.
Save jcnars/4b188b73b7020a8cc97d8f6c0be15fb8 to your computer and use it in GitHub Desktop.
✔ ~/learn_prow_local/test-infra [master ↓·167|✔]
20:21 $ minikube start
😄 minikube v1.23.2 on Debian rodete
✨ Automatically selected the docker driver
👍 Starting control plane node minikube in cluster minikube
🚜 Pulling base image ...
🔥 Creating docker container (CPUs=2, Memory=15900MB) ...
🐳 Preparing Kubernetes v1.22.2 on Docker 20.10.8 ...
▪ Generating certificates and keys ...
▪ Booting up control plane ...
▪ Configuring RBAC rules ...
🔎 Verifying Kubernetes components...
▪ Using image gcr.io/k8s-minikube/storage-provisioner:v5
🌟 Enabled addons: storage-provisioner, default-storageclass
🏄 Done! kubectl is now configured to use "minikube" cluster and "default" namespace by default
✔ ~/learn_prow_local/test-infra [master ↓·167|✔]
20:22 $ !baz
bazel run //prow/cmd/tackle
INFO: Analyzed target //prow/cmd/tackle:tackle (1 packages loaded, 876 targets configured).
INFO: Found 1 target...
Target //prow/cmd/tackle:tackle up-to-date:
bazel-bin/prow/cmd/tackle/tackle_/tackle
INFO: Elapsed time: 1.237s, Critical Path: 0.42s
INFO: 0 processes.
INFO: Build completed successfully, 1 total action
INFO: Build completed successfully, 1 total action
Existing kubernetes contexts:
0: gke_bmaas-testing_us-central1-c_cluster-1
1: gke_bmaas-testing_us-west1-a_prow-poc
* 2: minikube (current)
Choose context or [create new]: 2
Applying admin role bindings (to create RBAC rules)...
W1001 20:22:41.044189 28132 helpers.go:569] --dry-run=true is deprecated (boolean value) and can be replaced with --dry-run=client.
clusterrolebinding.rbac.authorization.k8s.io/prow-admin created
Deploying prow...
Apply starter.yaml from [github upstream]: /usr/local/google/home/jcnarasimhan/learn_prow_local/starter-gcs-incrementally-modified.yaml
namespace/prow created
configmap/plugins created
secret/github-token created
secret/hmac-token created
configmap/config created
deployment.apps/hook created
service/hook created
deployment.apps/sinker created
deployment.apps/deck created
service/deck created
deployment.apps/horologium created
deployment.apps/tide created
service/tide created
ingress.networking.k8s.io/prow created
deployment.apps/statusreconciler created
namespace/test-pods created
serviceaccount/deck created
rolebinding.rbac.authorization.k8s.io/deck created
rolebinding.rbac.authorization.k8s.io/deck created
role.rbac.authorization.k8s.io/deck created
role.rbac.authorization.k8s.io/deck created
serviceaccount/horologium created
role.rbac.authorization.k8s.io/horologium created
rolebinding.rbac.authorization.k8s.io/horologium created
serviceaccount/sinker created
role.rbac.authorization.k8s.io/sinker created
role.rbac.authorization.k8s.io/sinker created
rolebinding.rbac.authorization.k8s.io/sinker created
rolebinding.rbac.authorization.k8s.io/sinker created
serviceaccount/hook created
role.rbac.authorization.k8s.io/hook created
rolebinding.rbac.authorization.k8s.io/hook created
serviceaccount/tide created
role.rbac.authorization.k8s.io/tide created
rolebinding.rbac.authorization.k8s.io/tide created
serviceaccount/statusreconciler created
role.rbac.authorization.k8s.io/statusreconciler created
rolebinding.rbac.authorization.k8s.io/statusreconciler created
persistentvolumeclaim/ghproxy created
deployment.apps/ghproxy created
service/ghproxy created
deployment.apps/prow-controller-manager created
serviceaccount/prow-controller-manager created
role.rbac.authorization.k8s.io/prow-controller-manager created
role.rbac.authorization.k8s.io/prow-controller-manager created
rolebinding.rbac.authorization.k8s.io/prow-controller-manager created
rolebinding.rbac.authorization.k8s.io/prow-controller-manager created
deployment.apps/crier created
serviceaccount/crier created
role.rbac.authorization.k8s.io/crier created
role.rbac.authorization.k8s.io/crier created
rolebinding.rbac.authorization.k8s.io/crier created
rolebinding.rbac.authorization.k8s.io/crier created
Checking github credentials...
Store your GitHub token in a file e.g. echo $TOKEN > /path/to/github/token
Input /path/to/github/token to upload into cluster: /usr/local/google/home/jcnarasimhan/learn_prow_local/github_token_jcnars_github_app
INFO[0015] User() client=github
Prow will act as jcnars on github
Applying github token into oauth-token secret...W1001 20:22:53.953286 28496 helpers.go:569] --dry-run=true is deprecated (boolean value) and can be replaced with --dry-run=client.
secret/oauth-token created
Ensuring hmac secret exists at hmac-token...INFO[0015] Creating new hmac-token secret with random data...
exists
Looking for prow's hook ingress URL... FATA[0016] Could not get ingresses for service: hook error="the server could not find the requested resource (get ingresses.extensions)"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment